lexicalization | eng: Cryptographic attacks |
subclass of | (noun) (military) an offensive against an enemy (using weapons); "the attack began at dawn" onrush, attack, onslaught, onset |
| Note: 61 other instance(s) ommited in the following list |
has instance | e/de/Frequenzanalyse |
has instance | e/de/Kryptoanalytiker |
has instance | e/Adaptive chosen-ciphertext attack |
has instance | e/Adversary (cryptography) |
has instance | e/Bit-flipping attack |
has instance | e/Black bag operation |
has instance | e/Chosen-ciphertext attack |
has instance | e/Ciphertext-only attack |
has instance | e/Clock drift |
has instance | e/Contact analysis (cryptanalysis) |
has instance | e/Custom hardware attack |
has instance | e/Davies attack |
has instance | e/Differential fault analysis |
has instance | e/Differential-linear attack |
has instance | e/Distinguishing attack |
has instance | e/Gardening (cryptanalysis) |
has instance | e/Hessian form of an elliptic curve |
has instance | e/Impossible differential cryptanalysis |
has instance | e/Index of coincidence |
has instance | e/Interlock protocol |
has instance | e/Interpolation attack |
has instance | e/Known-plaintext attack |
has instance | e/Man-in-the-middle attack |
has instance | e/Message forgery |
has instance | e/Mod n cryptanalysis |
has instance | e/Partitioning cryptanalysis |
has instance | e/Piling-up lemma |
has instance | e/Preimage attack |
has instance | e/Rubber-hose cryptanalysis |
has instance | e/Stream cipher attack |
has instance | e/Supply chain attack |
has instance | e/TWINKLE |
has instance | e/Table of costs of operations in elliptic curves |
has instance | e/Timing attack |
has instance | e/Watermarking attack |
has instance | e/Weak key |
has instance | e/Zendian Problem |
has instance | e/Zygalski sheets |
has instance | e/pl/Atak pasywny |
has instance | e/ru/Атака с выбранным открытым текстом |